Skip to document

HBR Case Study 2 for The Adventures of an IT Leader book

HBR Case Study 2 for The Adventures of an IT Leader reflection questio...
Course

Management of Information Technology

7 Documents
Students shared 7 documents in this course
Academic year: 2020/2021
Uploaded by:
Anonymous Student
This document has been uploaded by a student, just like you, who decided to remain anonymous.
University of the Philippines System

Comments

Please sign in or register to post comments.

Preview text

Kung Thang HBR review 8/24/

1) An overview of the case study (including key people, setting, context, etc.),

 This case study is about a technology firm called ( Raydar Elecronics ) which was among the top five makers and integrators of radio frequency identification (RFID) tags and readers in the United States.  Dante Sorella was CEO of that company.  This company developed and sold inventory-tagging technologies that allowed its customer- primarily manufacturers and retailers- to streamline their supply chains.  Craig Davis was CEO of koolkids company who approached Dante Sorella for advice on making RFID tracking systems into retrial operations because KK began to experience stock-outs in its stores as theft and miscounts in the company’s warehouses intensified.  The goal is to give customers a better experience in its stores and sell them more clothes.  But it was a very difficult situation for Dante Sorella to decide whether to accept the offer because his lawyer and the company’s chief of communication officer discouraged him from accepting the offer due to some privacy issue.

2) Write statement of the problems,

 Ethical use of RFID  Invasion to privacy  Different regulations in different countries

Kung Thang HBR review 8/24/

3) Student will make alternative courses of actions,

Alternative 1  Using other technologies to implement that, I don’t know but something like lesser invasion to the privacy. Alternative 2  They can still use RFID, but I think, they need to be honest about that with its customers and the government.

4) Student should also provide areas of considerations that derive the alternative courses of actions

Areas of considerations for Alternative 1  They need to make sure that lesser invasion to the privacy, and database is also maintained if they use another alternative. It should be the one that the customers will accept Areas of considerations for Alternative 2  It might be very challenging for the company. Because modern people are very sensitive to its privacy. It can be a wrong move. Furthermore, if the business is expanded it to different country, this technology might not work there. Because different country has different regulations.

Was this document helpful?

HBR Case Study 2 for The Adventures of an IT Leader book

Course: Management of Information Technology

7 Documents
Students shared 7 documents in this course
Was this document helpful?
Kung Thang HBR review 8/24/21
1) An overview of the case study (including key people, setting, context, etc.),
This case study is about a technology firm called ( Raydar Elecronics ) which was among
the top five makers and integrators of radio frequency identification (RFID) tags and
readers in the United States.
Dante Sorella was CEO of that company.
This company developed and sold inventory-tagging technologies that allowed its
customer- primarily manufacturers and retailers- to streamline their supply chains.
Craig Davis was CEO of koolkids company who approached Dante Sorella for advice on
making RFID tracking systems into retrial operations because KK began to experience
stock-outs in its stores as theft and miscounts in the company’s warehouses intensified.
The goal is to give customers a better experience in its stores and sell them more clothes.
But it was a very difficult situation for Dante Sorella to decide whether to accept the offer
because his lawyer and the company’s chief of communication officer discouraged him
from accepting the offer due to some privacy issue.
2) Write statement of the problems,
Ethical use of RFID
Invasion to privacy
Different regulations in different countries